Tools for Preserving Your Personal and Intellectual Privacy Wendy - - PowerPoint PPT Presentation

tools for preserving your
SMART_READER_LITE
LIVE PREVIEW

Tools for Preserving Your Personal and Intellectual Privacy Wendy - - PowerPoint PPT Presentation

Tools for Preserving Your Personal and Intellectual Privacy Wendy Stephens Jacksonville State University Thursday, July 20, 1:15 2:15pm Eastern A project of the University of Michigan School of Information, U-M Library, and U-M School of


slide-1
SLIDE 1

Tools for Preserving Your Personal and Intellectual Privacy

Wendy Stephens Jacksonville State University

Thursday, July 20, 1:15 – 2:15pm Eastern

A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

slide-2
SLIDE 2

Sponsors

slide-3
SLIDE 3

Door Prizes

slide-4
SLIDE 4

Door Prize: 6 Months of Easel.ly Pro

slide-5
SLIDE 5

SCECHs

Log in with your full name Attend all of at least 3 live sessions and up to 8 Scan your form and email to contact.data.literacy@umich.edu by Monday, July 24, AND mail it in (mailing is new this year). More information: http://dataliteracy.si.umich.edu/scech

slide-6
SLIDE 6

New in 2017! For those needing certificates …

Follow SCECH instructions (scan and mail). Plus

Go to http://bit.ly/4t-store

Pay $25 there no later than Monday, July 24

slide-7
SLIDE 7

http://dataliteracy.si.umich.edu/conference #4tdl

slide-8
SLIDE 8
slide-9
SLIDE 9

Join us in the chat! Where are you from?

slide-10
SLIDE 10

Tools for Preserving Your Personal and Intellectual Privacy

Wendy Stephens Jacksonville State University

Thursday, July 20, 1:15 – 2:15pm Eastern

A project of the University of Michigan School of Information, U-M Library, and U-M School of Education. This project was made possible in part by the Institute of Museum and Library Services RE 00-00-15-0113-15.

slide-11
SLIDE 11

Wendy Stephens, Presenter

slide-12
SLIDE 12

Today, we’ll …

  • 1. Talk about privacy as a concept
  • 2. Talk about tools you can use to

safeguard your personal information and intellectual inquiry

  • 3. Talk about personal privacy

strategies to share with students and teachers

slide-13
SLIDE 13
slide-14
SLIDE 14

Image: Couleur

slide-15
SLIDE 15

Image: Alexas_Photo

slide-16
SLIDE 16

https://www.youtube.com/watch?v=B8ofWFx525s https://www.youtube.com/watch?v=B8ofWFx525s

slide-17
SLIDE 17

Janet Vertesi sociologist of science and technology Assistant Professor in the Sociology Department at Princeton University

slide-18
SLIDE 18
slide-19
SLIDE 19

In the chat...

What are your experiences with online tracking? When did you first become aware of it?

slide-20
SLIDE 20

These findings suggest that the phrase that best captures Americans’ views on the choice between privacy vs. disclosure of personal information is, “It depends.” People’s views on the key tradeoff of the modern, digital economy – namely, that consumers offer information about themselves in exchange for something of value – are shaped by both the conditions of the deal and the circumstances of their lives.

http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/

slide-21
SLIDE 21

http://www.pewresearch.org/fact-tank/2016/09/21/the-state-of-privacy-in-america

slide-22
SLIDE 22

Image: Matvevna

slide-23
SLIDE 23
slide-24
SLIDE 24

HTTPS Everywhere from EFF a Firefox, Chrome, and Opera extension that encrypts your communications, making your browsing more secure

slide-25
SLIDE 25

Opera browser with an intergrated toggle for VPN

slide-26
SLIDE 26

DuckDuckGo Search engine that doesn’t track you

slide-27
SLIDE 27

StartPage browser provides Google search results while maintaining privacy protection

slide-28
SLIDE 28

TOR bounces internet users' and websites' traffic through "relays" run by thousands of volunteers around the world, making it extremely hard for anyone to identify the source of the information or the location of the user

slide-29
SLIDE 29

Ghostery ad-tracking and blocking plug- in

slide-30
SLIDE 30

TrackMeNot plug-in runs as a background process periodically issuing false search leads.

slide-31
SLIDE 31

Signal app for encrypted communicati

  • n including

audio and video

slide-32
SLIDE 32

doNOTlink.it for sharing URLs without boosting search engine results ratings

slide-33
SLIDE 33

ProtonMail for encrypted email

slide-34
SLIDE 34

Alternating browsers for high-tracking sites

slide-35
SLIDE 35

“Encoding content, subtweeting, and otherwise engaging in social steganography offers

  • ne strategy for reclaiming

agency in an effort to achieve privacy in networked publics. In doing so, teens recognize that limiting access to meaning can be a much more powerful tool for achieving privacy than trying to limit access to the content itself.”

  • - boyd
slide-36
SLIDE 36

Image: MOMA

“The focus on our limited revolution is

  • n mitigating and defeating present-

day digital surveillance.” -- Brunton & Nissenbaum

slide-37
SLIDE 37

In the chat...

What are some strategies you use for protecting your personal information

  • nline?
slide-38
SLIDE 38

Recap:

  • 1. Privacy continues to

matter in ways we can’t even anticipate

  • 2. No one is ever really

anonymous on the web

  • 1. Tools can help you

shield your personal information

Questions?

Wendy Stephens Jacksonville State University wstephens@jsu.edu @wsstephens

slide-39
SLIDE 39

Please take the evaluation (link in chat) to be entered for door prizes!